11
Ori Eisen: Methods and apparatus for detecting fraud with time based computer tags. THE 41ST PARAMETER, Wilson Sonsini Goodrich & Rosati, June 16, 2015: US09060012 (7 worldwide citation)

Systems and methods for creating and analyzing computer tag information for the prevention or detection of potential fraud. Computers and other devices accessing the Web carry device tags with date and time information describing when they were issued by a security tag server. A server time stamp ma ...


12
Justin D Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. J Johnson, March 28, 2017: US09609006 (7 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


13
Kia Silverbrook, Paul Lapstun, Jacqueline Anne Lapstun: Method and system for banking. Silverbrook Research, July 29, 2008: US07406445 (7 worldwide citation)

Methods and systems are disclosed which relate to online banking via interface surfaces printed with information and coded data. The coded data, encoded visibly or invisibly, may be queried by an appropriate sensing device. The sensing device communicates with a computer system. Together, the interf ...


14
Au Kean Hoe: Method of secure payment over a network. Au Kean Hoe, WYATT David Alan, December 21, 2007: WO/2007/144708 (6 worldwide citation)

A secure transaction is carried out by a merchant application which provides details of the customer bank and the transaction amount to a host system (104) and receives a transaction identifier. The merchant provides the customer with the identifier. The customer uses the bank's online banking and e ...


15
Matthew Brezina, Adam Smith: Presentation of organized personal and public data using communication mediums. YAHOO, James J DeCarlo, Greenberg Traurig, February 28, 2017: US09584343 (5 worldwide citation)

Systems, methods and computer program products for providing information associated with an attachment (e.g., attachment received through an instant message system, online collaboration tool, electronic message and the like). A sidebar may allow a user to view comprehensive profile and content infor ...


16
Hans Martin Boesgaard Sørensen: Digital data authentication. Codesealer APS, Harness Dickey & Pierce, June 18, 2013: US08468351 (5 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...


17
Jonathan D Main: Computerized banking device and method of use. White Welker & Welker, June 17, 2008: US07387237 (5 worldwide citation)

The present invention is banking device that has a slot on the top surface to accept coins and contains therein a locking reservoir for the collection of change. A money sorter is used to count the deposited money. The reservoir is “keyed” and can only be opened by the local bank, where an account i ...


18
Delaram Fakhrai, Mehran Moshfeghi: Method and system for improved security utilizing location based services for authentication. GOLBA, Adeli, December 22, 2015: US09218480 (5 worldwide citation)

An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit card purchases, ecommerce, brokerage services, corporate databases, and online content (movies, music and software). The method involves a brid ...


19
Brian Colella: System for secure online selling, buying and bill pay in an electronic commerce setting. Ober Kaler, Royal W Craig, May 24, 2011: US07949609 (5 worldwide citation)

A method and system for biometric-secure online selling, buying and bill paying in electronic commerce and retail point-of-sale settings that also simplifies the checkout process and eliminates fraudulent transactions. The system relies on an exchange service provider (ESP) that hosts multiple serve ...


20
Michael Burger, Mark Joseph Kapczynski: Systems and methods of identity protection and management. Consumerinfo com, Knobbe Martens Olson & Bear, January 10, 2017: US09542553 (4 worldwide citation)

In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitor ...



Click the thumbnails below to visualize the patent trend.